User:Invokerishard/sandbox

https://en.wikipedia.org/wiki/User:Invokerishard/Evaluate_an_Article

https://en.wikipedia.org/wiki/User:Invokerishard/Computer_worm/Bibliography?veaction=edit&preload=Template%3ADashboard.wikiedu.org_bibliography

User:Invokerishard/Choose an Article

User:Invokerishard/Computer worm

Quality Sources
1.Wehner, Stephanie1 Analyzing worms and network traffic using compression. Journal of Computer Security. 2007, Vol. 15 Issue 3, p303-320. 18p. 6 Diagrams, 1 Chart, 1 Graph.

https://libproxy.albany.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=24417921&site=ehost-live

2.Bronk, Christopher，Tikk-Ringas, ''Eneken The Cyber Attack on Saudi Aramco.Survival (00396338). Apr/May2013, Vol. 55 Issue 2, p81-96. 16p.''

https://libproxy.albany.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=86689165&site=ehost-live

3.Lawton, George，On the Trail of the Conficker Worm. Computer (00189162). Jun2009, Vol. 42 Issue 6, p19-22. 4p. 1 Chart

https://libproxy.albany.edu/login?url=http://search.ebscohost.com/login.aspx?direct=true&db=a9h&AN=42648582&site=ehost-live

Respone to Peer-review
List of Peer Suggestions

1.Although the source data may be a bit outdated, the stuxnet virus does appear in people's field of vision earlier and rarely, so most of the data comes from when it first appeared.

Responses to Peer Suggestions

1.I may add some pictures about the worm, but it is a challenge to make the pictures professional and understandable by ordinary people.

2.Regarding the definition part, my statement is not much different from the original article, because I want to expand the characteristics of the worm through the information I am looking for, and I am still using a more accessible method to explain its characteristics.